Hi Bernard,
Unfortunately, the restore point did not fix the issue. About 15 mins after I last posted, it BSOD'd again, and this time it would not recover/re-boot. It got partly into the boot rotating dots and bombed out. Auto repair did not work either. Tried this sveral times - same result each time. Despair. A lot of thinking about why? And there was an answer, described below FYI
A desktop it is, and the C (and boot) drive is an SSD, installed Jan 2018 and now 4.5 years old, with daily usage since then under win7 and, from mid-2020, win10. It certainly speeded up things like AV scans, backups and other time lengthy and compute intensive activities. And at the time, there was extensive articles on SSD usage, since price was becoming very competitive, and tech advisors were strongly recommending using them. Those articles explained the memory structure and how it worked: in essence, the nand cells destroy data on read, and that has to be written back to save it: much like the old style wired magnetic core memories (that I can remember that far back dates me a bit). And nand cells have a write life. So the advice was, when using an SSD, disable regular memory intensive functions like de-fragmenting, since with a random access memory like SSD it contributed nothing to performance and very likely had a negative effect on the write life of the memory cells in the SSD. So, I did that: turned off scheduling for defrag for the whole system. The failure pattern for an SSD was theorised to be random, as compared to an HDD (which as a serial device would usually fail catastrophically).
And last week what I was seeing seemed to be random failures (BSOD's) every 15-20 minutes, but the machine after creating a minidump file was rebootable. Over 2 days I had about 20 of these events, and every time the app in use was different and the error message was also different. You, the MS community, examined the dump files, and explicated a cause (Ntkrnlmp.exe) and the most likely fix given what had not been happening to various resourcs was a restore. So did a restore to the last one before the events began, and it completed Ok and re-booted. See post above. But failed again BSOD 15 mins later, and this time it would not re-boot, many tries. My Acronis bootable recovery disks did not work on the tower, but worked fine on an operable laptop. Several frustrating days.
Reflecting on the SSD advisories from years ago, I recalled that I had a spare brand new Samsung SSD. If it did not work, I had lost nothing. So I installed that, and behold! my Acronis bootable disks work again. And I was able to initialise, format and create the active partition for the OS (the DD12 disk), and then boot and start TI2021 (the TI2021 disk) and recover the 1 Aug backup, a copy of which was deliberately on one of the other HDD in the tower, for just this sort of eventuality. More time getting the boot priorities in the BIOS correct, and the desktop is live again. And after 3 days of use, no BSOD's.
Clearly a desperate hypothesis re the original SSD was correct: bits of it were experiencing cell death, and I wondered why? It was a well known Kingston brand and at 4.5 years old it should not have done that. In fact, most ssd's from years ago would still not be into the cell death zone; one user I know of who was an early adopter (well before me) still had not experienced this phenomenon. Thinking about that I realised that I'd been doing weekly AV scans, and since win10, for 2 years I'd been using Defender to do a whole of system AV scan once a week - and that by Defenders count that went to 2.75 million files read and tested over 2 hours. Quite probably a worse task for the SSD than a monthly de-fragment. And the BSOD's began the morning after the last weekly AV scan.
That's the story. So, my recommendation; when using an SSD, don't do whole of PC AV scans unless there is an infection reason to do it. this would apply to windows defender and any 3rd party AV application - a concentrated read pattern from each type of program is the same.